US7948982B2 - Gateway controlling access to an active network - Google Patents
Gateway controlling access to an active network Download PDFInfo
- Publication number
- US7948982B2 US7948982B2 US10/239,072 US23907202A US7948982B2 US 7948982 B2 US7948982 B2 US 7948982B2 US 23907202 A US23907202 A US 23907202A US 7948982 B2 US7948982 B2 US 7948982B2
- Authority
- US
- United States
- Prior art keywords
- message
- data
- network
- active
- access control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2869—Operational details of access network equipments
- H04L12/287—Remote access server, e.g. BRAS
- H04L12/2874—Processing of data for distribution to the subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
- H04L12/462—LAN interconnection over a bridge based backbone
- H04L12/4625—Single bridge functionality, e.g. connection of two networks over a single bridge
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Definitions
- the present invention relates to telecommunications networks whose nodes are capable of processing in a specific way information messages that they receive; to be more precise, it relates to accessing telecommunications networks of the above kind.
- the invention applies more particularly to active networks, i.e. networks in which some of the routing systems (nodes) are capable of processing in a specific way at least some of the messages conveyed by the network.
- nodes i.e. networks in which some of the routing systems (nodes) are capable of processing in a specific way at least some of the messages conveyed by the network.
- nodes in an active network necessarily have processing capacity: a distinction is therefore drawn between active nodes and non-active nodes, which are usually called passive nodes. Similarly, not all messages require specific processing: a distinction is therefore drawn between active messages and non-active (passive) messages.
- Computer and telecommunications networks can be divided into a plurality of domains, also known as sub-networks. This is known in the art. Controlling access to a domain by means of an access control gateway is also known in the art. In Internet Protocol networks the access control gateway is called an edge router and the routing systems (nodes) are called routers.
- access control gateways are primarily limited to verifying the right to use the bandwidth corresponding to the data transmitted by a sender.
- FIG. 1 shows the environment of an access control gateway E of the above kind.
- the access control gateway E administers access to a domain D made up of N nodes R 1 , R 2 , R 3 , . . . , RN.
- the figure shows two senders A and B of messages, for example host stations or nodes of another domain.
- Sender A is not authorized to send messages to the domain D.
- the access control gateway E therefore blocks messages coming from sender A.
- sender B is authorized to send messages to the domain D.
- the access control gateway can therefore pass messages coming from sender B. In a more sophisticated implementation of this access control gateway, it passes only a number of messages corresponding to the bandwidth to which the sender B has subscribed, for example.
- the above kind of access control gateway does not administer the processing generated by messages received from senders. If the domain D includes active routing systems, there is nothing to prevent senders A and B sending messages requiring considerable processing resources of the active routing systems.
- An object of the invention is to alleviate the above problems by checking at the access control gateway the messages entering a domain.
- the invention firstly provides an access control gateway for controlling access to a first data network, which gateway includes filter means for filtering data coming from a second data network. It is characterized in that the filter means are adapted to decide whether to transmit the data to the first network as a function of information contained in the data and relating to the processing of the data by active routing systems of the first network.
- the invention also provides a method of transmitting to a first network, which is a data network, data coming from a second network, which is an access network, via an access control gateway.
- This method is characterized in that it includes the following steps:
- FIG. 1 is a diagram showing the environment of an access control gateway.
- FIG. 2 shows a second embodiment of the invention.
- the data received via the access control gateway is conventionally formatted into messages, which are known as packets in the case of the Internet.
- These messages include a message body and a header, which comprises a plurality of fields.
- the information relating to the processing of the data by the routing systems can be inserted into the header fields of the message or into the body itself.
- This information can include:
- IP Internet Protocol
- the information on whether the message requires specific processing can simply be a flag indicating if the message in question is an active message or a normal message.
- the execution environment specifies the execution environment required to process the message, for example in the form of identifiers.
- the execution environment can be an operating system that the routing system must have, for example. It can also specify a version of the operating system, or even supplementary software modules required to process the message, etc.
- the access control gateway determines whether a message must be transmitted on receiving the message.
- the access control gateway determines whether a message must be transmitted only for the first message of a stream, i.e. for the first message of a set of messages having the same sender, the same receiver or receivers, and the same network characteristics (protocol, port, etc.). The decision (to transmit the message or not) is then applied to all the other messages of the stream.
- the decision taken by the filter means of the access control gateway can be of various kinds.
- Messages can be marked conventionally, i.e. a field (in the header, for example) can indicate if a message is an active message or a passive message. In this case, conversion into a passive message merely consists in modifying the value of this field.
- this field could be the field indicating the execution environment, which would then take a special value.
- Another decision encompassing the preceding decision, would be to transmit the message and allocate a limited quantity of processing resources, in which case it can be transmitted in the domain controlled by the access control gateway, with each active node processing the message only within the limits of the resources allocated to the message in question.
- a message can be transmitted with a resource allocation equal to zero, which corresponds to transmitting a message as if it were not active.
- the advantage of this is that if the message is transmitted to another domain made up of active nodes it can be allocated non-zero processing resources and be processed as an active message.
- This allocation of processing resources can be effected conventionally by placing the corresponding value in a dedicated field. Modifying the allocation of processing resources simply consists in modifying the value of this field.
- Another decision that could be taken by the filter means of the access control gateway is to accept the message and transmit it in the controlled domain without modification. If the access control gateway also has a routing function, it can transmit the message to its routing system, and if it has an execution environment, it can transmit the message to that environment and initiate specific processing.
- the decision can be taken by the filter means on the basis of information inserted into the received messages, as previously described.
- the filter means can access.
- the profile database can be contained in the access control gateway, for example, and match message sender identifiers and authorization parameters.
- the profile database can correspond to agreements entered into between customers and the operator managing the domain controlled by the access control gateway.
- a customer identified by a sending address may have entered into an agreement providing only for the transmission of passive messages and not for the transmission of active messages.
- the profile database can indicate the customer's rights of access in the form of authorization parameters, and the filter means can accept or reject messages coming from this customer as a function of their status (active, passive).
- a customer might have entered into an agreement providing for only some types of execution environment.
- the field indicating the execution environment required to process the message must also be tested, and a decision taken as a function of the match between the execution environments covered by the agreement and the execution environment indicated in the message.
- the data filter means can operate in collaboration with a control server S.
- control server can be an active code server conventionally used to supply active code to the nodes of an active network.
- the collaboration between the access control gateway E and the control server S can be implemented by means of a communications protocol, for example the Common Open Policy Service (COPS) protocol defined by RFC 2748 of the Internet Engineering Task Force (IETF).
- COPS Common Open Policy Service
- IETF Internet Engineering Task Force
- the access control gateway uses these rules to decide whether to transmit the active packets received.
- the first mode conforms to the Outsourcing mechanism and the second to the Provisioning mechanism.
- the access control gateway On receiving an active packet, the access control gateway first determines the information pertinent to the access control function contained in the active packet. This information typically includes an identifier of the active code and data relating to the execution environment required for the active code.
- control server S can decide whether the active packet can be transmitted in the domain; if it can be transmitted, it decides whether other operations must be carried out (for example, converting the packet into a passive message, or allocating it limited processing resources, as explained above).
- the control server S then transmits its decision to the access control gateway E, which can implement the decision by means of the filter means.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
-
- reading information contained in the data and relating to processing of the data by active routing systems of the first network, and
- deciding whether to transmit the data as a function of that information.
-
- information on the sender and the receiver or receivers of the message,
- information on the execution environment needed to process the message, and
- information on whether the message requires specific processing.
-
- In one mode, the access control gateway E interrogates the control server S when necessary (i.e. each time an active packet, or the first packet of a stream of active packets, is received). The control server S decides whether to transmit the active packet or packets. It transmits its response to the access control gateway E which initiates transmission of the packets, or not, as a function of that response.
- In the other mode the control server S transmits a set of rules to the access control gateway E.
Claims (11)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0100800A FR2819962B1 (en) | 2001-01-22 | 2001-01-22 | ACTIVE NETWORK ACCESS CONTROL GATEWAY |
FR0100800 | 2001-01-22 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20030169750A1 US20030169750A1 (en) | 2003-09-11 |
US7948982B2 true US7948982B2 (en) | 2011-05-24 |
Family
ID=8859074
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/239,072 Expired - Fee Related US7948982B2 (en) | 2001-01-22 | 2002-01-21 | Gateway controlling access to an active network |
Country Status (5)
Country | Link |
---|---|
US (1) | US7948982B2 (en) |
EP (1) | EP1271890B1 (en) |
AT (1) | ATE391380T1 (en) |
DE (1) | DE60225875T2 (en) |
FR (1) | FR2819962B1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070027793A1 (en) * | 2005-08-01 | 2007-02-01 | Lutnick Howard W | Systems and methods for maintaining the viability of a market order type in fluctuating markets |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6263372B1 (en) * | 1993-10-15 | 2001-07-17 | Link Usa Corp. | Method and apparatus for interfacing two or more applications in a client server |
US20020036983A1 (en) * | 2000-05-22 | 2002-03-28 | Ina Widegren | Application influenced policy |
US20020095496A1 (en) * | 2001-01-17 | 2002-07-18 | Antes Mark L. | Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment |
US20030105830A1 (en) * | 2001-12-03 | 2003-06-05 | Duc Pham | Scalable network media access controller and methods |
US6775231B1 (en) * | 1999-09-24 | 2004-08-10 | Cisco Technology | Dynamic weighted resource sharing |
US20050117576A1 (en) * | 2000-11-28 | 2005-06-02 | Mci, Inc. | Network access system including a programmable access device having distributed service control |
US6931026B1 (en) * | 1998-04-14 | 2005-08-16 | Samsung Electronics Co., Ltd. | Data transmission method in mobile communication system |
US7012890B2 (en) * | 2001-07-02 | 2006-03-14 | Hitachi, Ltd. | Packet forwarding apparatus with packet controlling functions |
US7065578B2 (en) * | 2000-03-20 | 2006-06-20 | At&T Corp. | Service selection in a shared access network using policy routing |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US95496A (en) * | 1869-10-05 | Of sugar |
-
2001
- 2001-01-22 FR FR0100800A patent/FR2819962B1/en not_active Expired - Fee Related
-
2002
- 2002-01-21 AT AT02290144T patent/ATE391380T1/en not_active IP Right Cessation
- 2002-01-21 EP EP02290144A patent/EP1271890B1/en not_active Expired - Lifetime
- 2002-01-21 DE DE60225875T patent/DE60225875T2/en not_active Expired - Lifetime
- 2002-01-21 US US10/239,072 patent/US7948982B2/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6263372B1 (en) * | 1993-10-15 | 2001-07-17 | Link Usa Corp. | Method and apparatus for interfacing two or more applications in a client server |
US6931026B1 (en) * | 1998-04-14 | 2005-08-16 | Samsung Electronics Co., Ltd. | Data transmission method in mobile communication system |
US6775231B1 (en) * | 1999-09-24 | 2004-08-10 | Cisco Technology | Dynamic weighted resource sharing |
US7065578B2 (en) * | 2000-03-20 | 2006-06-20 | At&T Corp. | Service selection in a shared access network using policy routing |
US20020036983A1 (en) * | 2000-05-22 | 2002-03-28 | Ina Widegren | Application influenced policy |
US6621793B2 (en) * | 2000-05-22 | 2003-09-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Application influenced policy |
US20050117576A1 (en) * | 2000-11-28 | 2005-06-02 | Mci, Inc. | Network access system including a programmable access device having distributed service control |
US7046680B1 (en) * | 2000-11-28 | 2006-05-16 | Mci, Inc. | Network access system including a programmable access device having distributed service control |
US20020095496A1 (en) * | 2001-01-17 | 2002-07-18 | Antes Mark L. | Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment |
US7012890B2 (en) * | 2001-07-02 | 2006-03-14 | Hitachi, Ltd. | Packet forwarding apparatus with packet controlling functions |
US20030105830A1 (en) * | 2001-12-03 | 2003-06-05 | Duc Pham | Scalable network media access controller and methods |
Non-Patent Citations (2)
Title |
---|
D. Raz et al, "Active Networks for Efficient Distributed Network Management", IEEE Communications Magazine, Mar. 2000, IEEE, USA, vol. 38, No. 3, pp. 138-143, XP002182235. |
J. Aweya, "On the design of IP routers Part 1: Router architectures", Journal of Systems Architecture, Elsevier Science Publishers BV, Amsterdam< NL, vol. 46, No. 6 Apr. 2000, pp. 483-511, XP004190486. |
Also Published As
Publication number | Publication date |
---|---|
EP1271890B1 (en) | 2008-04-02 |
EP1271890A2 (en) | 2003-01-02 |
FR2819962A1 (en) | 2002-07-26 |
DE60225875T2 (en) | 2009-04-09 |
US20030169750A1 (en) | 2003-09-11 |
FR2819962B1 (en) | 2003-06-20 |
DE60225875D1 (en) | 2008-05-15 |
ATE391380T1 (en) | 2008-04-15 |
EP1271890A3 (en) | 2003-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11706102B2 (en) | Dynamically deployable self configuring distributed network management system | |
CN109565500B (en) | On-demand security architecture | |
US6993023B2 (en) | Parallel analysis of incoming data transmissions | |
EP1021015B1 (en) | System for policy-based network configuration | |
US8081640B2 (en) | Network system, network management server, and access filter reconfiguration method | |
CN101582822B (en) | open network connection | |
CN1938982B (en) | Method and apparatus for preventing network attacks by authenticating internet control message protocol packets | |
US20070061458A1 (en) | Dynamic address assignment for access control on DHCP networks | |
EP0986229A2 (en) | Method and system for monitoring and controlling network access | |
EP2159956B1 (en) | A method, system and device for configuring the operations, administrator and maintenance property | |
CN102025535A (en) | Virtual machine management method and device and network equipment | |
US20030210699A1 (en) | Extending a network management protocol to network nodes without IP address allocations | |
JP2008504776A (en) | Method and system for dynamic device address management | |
WO2002088981A1 (en) | Analysis of incoming data transmissions | |
EP2731313A1 (en) | Distributed cluster processing system and message processing method thereof | |
CN110098988B (en) | Method and system for processing internet protocol packets | |
US20130275620A1 (en) | Communication system, control apparatus, communication method, and program | |
CN112217781A (en) | Method and apparatus for analyzing service-oriented communications | |
US7254628B2 (en) | Network management system with validation of policies | |
CN112385194B (en) | State packet transmission between remote networks | |
CN112217779A (en) | Method and apparatus for analyzing service oriented communications | |
US7948982B2 (en) | Gateway controlling access to an active network | |
US7406045B2 (en) | Modular policy decision point for processing resource-reservation requests within a data network | |
CN115412527A (en) | Method and communication device for one-way communication between virtual private networks | |
Cisco | Protocol Translation Configuration Guide and Command Reference Cisco Internetwork Operating System Release 11.0 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALCATEL, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GALAND, DAMIEN;MARCE, OLIVIER;EL MGHAZLI, YACINE;REEL/FRAME:014071/0992 Effective date: 20020905 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNOR:LUCENT, ALCATEL;REEL/FRAME:029821/0001 Effective date: 20130130 Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:029821/0001 Effective date: 20130130 |
|
AS | Assignment |
Owner name: ALCATEL LUCENT, FRANCE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033868/0001 Effective date: 20140819 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001 Effective date: 20170912 Owner name: NOKIA USA INC., CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001 Effective date: 20170913 Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001 Effective date: 20170913 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: ALCATEL LUCENT, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:ALCATEL;REEL/FRAME:048329/0784 Effective date: 20061130 Owner name: NOKIA US HOLDINGS INC., NEW JERSEY Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682 Effective date: 20181220 |
|
AS | Assignment |
Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104 Effective date: 20211101 Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104 Effective date: 20211101 Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723 Effective date: 20211129 Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723 Effective date: 20211129 |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001 Effective date: 20211129 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: BARINGS FINANCE LLC, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:RPX CORPORATION;REEL/FRAME:063429/0001 Effective date: 20220107 |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230524 |